Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Information Gain
biblio
Employing Information Theoretic Metrics with Data-Driven Occupancy Detection Approaches: A Comparative Analysis
Submitted by grigby1 on Fri, 09/01/2023 - 1:22pm
Entropy
Occupancy Detection
Information Gain
Gini Impurity Index
cross-entropy
Human Factors
Temperature distribution
information theoretic security
Signal processing algorithms
Compositionality
Measurement
composability
signal processing
Scalability
Radio frequency
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
machine learning algorithms
information security
collaboration
biblio
Extracting Textual Features of Financial Social Media to Detect Cognitive Hacking
Submitted by aekwall on Mon, 10/12/2020 - 10:43am
Pricing
Human Behavior and Cybersecurity
textual features extraction
stock movements
stock markets
social media
price movements
potential cognitive hacking attacks
Information Gain
financial social media messages
financial market
Cognitive Hacking
abnormal behavior
Computer crime
Text Mining
cyber threats
cognition
Data mining
Economics
Companies
Cybersecurity
social networking (online)
Social network services
pubcrawl
Human behavior
feature extraction
biblio
An Association Rule Mining-Based Framework for Profiling Regularities in Tactics Techniques and Procedures of Cyber Threat Actors
Submitted by grigby1 on Fri, 03/15/2019 - 10:52am
machine learning-based framework
TTPs
tools
threat vectors
threat information
Tactics Techniques and Procedures
tactics techniques
STIX
security of data
pubcrawl
profiling regularities
privacy
Metrics
malware
association rule mining
learning (artificial intelligence)
input cyber threat intelligence documents
Information Gain
feature extraction
Data mining
cyber threat intelligence
cyber threat actors
Cyber Threat Actor
cyber domain
CTAs
Conferences
Computer hacking
behavior